GIAC GSLC - GIAC Security Leadership Certification (GSLC)
Which of the following honeypots captures limited amounts of information, mainly transactional data and some limited interaction?
Which of the following tools can be used to perform ICMP tunneling?
Each correct answer represents a complete solution. Choose two.
You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection?
Each correct answer represents a complete solution. Choose two.
Which of the following attacks allows an attacker to recover the key in an RC4 encrypted stream from a large number of messages in that stream?
Which of the following protocols uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity for secure browsing on the Internet?
Which of the following is NOT an input of the Administer Procurements process?
Which of the following options is an approach to restricting system access to authorized users?
Which of the following is the rating for gasoline or oil fires?
Which of the following is a valid space efficiency of RAID 3?
Which of the following malware spread through the Internet and caused a large DoS attack in
1988?
Which of the following is used for high-level or comprehensive analysis, as well as for root cause analysis?
Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following attacks can be performed by Brutus for cracking a password?
Each correct answer represents a complete solution. Choose two.
Which of the following is the practice of a domain name registrant using the five-day "grace period" (the Add Grace Period or AGP) at the beginning of the registration of an ICANN-regulated second-level domain to test the marketability of the domain?
